This shows you the differences between two versions of the page.
Next revision Both sides next revision | |||
network-debugging [2018/02/27 10:11] klueppel created |
network-debugging [2018/02/27 10:27] klueppel |
||
---|---|---|---|
Line 11: | Line 11: | ||
__Linux:__ | __Linux:__ | ||
+ | <WRAP center round box 100%> | ||
ssh root@192.168.1.1 tcpdump -U -i any s0 -w - 'not port 22' | wireshark -k -i - | ssh root@192.168.1.1 tcpdump -U -i any s0 -w - 'not port 22' | wireshark -k -i - | ||
+ | </WRAP> | ||
__Windows:__ | __Windows:__ | ||
+ | <WRAP center round box 100%> | ||
plink.exe -ssh -pw admin01 root@192.168.1.1 "tcpdump -i any -vn not port 22" | "C:\Program Files\Wireshark\Wireshark.exe" -i - | plink.exe -ssh -pw admin01 root@192.168.1.1 "tcpdump -i any -vn not port 22" | "C:\Program Files\Wireshark\Wireshark.exe" -i - | ||
+ | </WRAP> | ||
You can specify the interface with the -i parameter e.g.: "tcpdump -i lan0 -w - 'not port 22' | You can specify the interface with the -i parameter e.g.: "tcpdump -i lan0 -w - 'not port 22' | ||
We recommend you to exclude the SSH port (22) that you only caputre the traffic you are interested in. | We recommend you to exclude the SSH port (22) that you only caputre the traffic you are interested in. | ||